共 33 条
[1]
Ghosal SK, Mandal JK., Binomial transform based fragile watermarking for image authentication, Journal of Information Security and Applications, 19, 4–5, pp. 272-281, (2014)
[2]
Vyas C, Lunagaria M., A review on methods for image authentication and visual cryptography in digital image watermarking, Proc. of the 2014 IEEE Int’l Conf. on Computational Intelligence and Computing Research, pp. 1-6, (2014)
[3]
Chang CC, Chen KN, Lee CF, Liu LJ., A secure fragile watermarking scheme based on chaos-and-hamming code, Journal of Systems and Software, 84, 9, pp. 1462-1470, (2011)
[4]
Huo YR, He HJ, Chen F., Alterable-capacity fragile watermarking scheme with restoration capability, Optics Communications, 285, 7, pp. 1759-1766, (2012)
[5]
Qin C, Ji P, Zhang XP, Dong J, Wang JW., Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy, Signal Processing, 138, pp. 280-293, (2017)
[6]
Su GD, Chang CC, Chen CC., A hybrid-Sudoku based fragile watermarking scheme for image tampering detection, Multimedia Tools and Applications, 80, 8, pp. 12881-12903, (2021)
[7]
Kim C, Yang CN., Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches, Applied Sciences, 11, 3, (2021)
[8]
Zhang XP, Yin ZX., Data hiding in multimedia, Chinese Journal of Nature, 39, 2, pp. 87-95, (2017)
[9]
Li XL., A review on image reversible data hiding, Journal of Information Security Research, 2, 8, pp. 729-734, (2016)
[10]
Tian J., Reversible data embedding using a difference expansion, IEEE Trans. on Circuits and Systems for Video Technology, 13, 8, pp. 890-896, (2003)